|Publication number||US7305702 B2|
|Application number||US 10/042,963|
|Publication date||Dec 4, 2007|
|Filing date||Jan 9, 2002|
|Priority date||Jan 9, 2002|
|Also published as||EP1327954A2, EP1327954A3, US20030130952|
|Publication number||042963, 10042963, US 7305702 B2, US 7305702B2, US-B2-7305702, US7305702 B2, US7305702B2|
|Inventors||David G. Bell, Anthony Tao Liang, Mitch Garnaat, Francoise Brun-Cottan|
|Original Assignee||Xerox Corporation|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (19), Non-Patent Citations (4), Referenced by (20), Classifications (9), Legal Events (7)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The present invention relates to the fields of electronic marketplaces and encrypted electronic products, and more particularly to the administration of electronic markets that incorporate control of usage permissions for encrypted electronic products.
Existing electronic markets include, for example, auctions where sellers place products up for bid to buyers, or storefronts where products are offered for sale or license at a specific price.
These electronic markets are typically public markets, and therefore a party placing a product for sale, license or bid presents the product to all persons capable of connecting to the system, without the ability to electronically control who is permitted to access the market or who is permitted to use their products.
These electronic markets function as centrally administered mass meeting venues, where large numbers of buyers and sellers interact. They are technically challenging to create and require significant economic investment to build and maintain. The centralized administration of market controls means that to participate a seller is required to utilize the centralized administration controls, including controls on who is permitted to access the market and who is permitted to use the products. Thus, in these centrally administrated public markets, owners of the products have little or no direct control over the configuration or operation of the market.
Further, it is becoming common for the products being distributed through electronic marketplaces to be electronic products. For example, audio and video recordings, software, electronic books and multi-media works are all being electronically published. Electronically published materials are typically distributed in a digital form and copied on a computer-based system having the capability to display or otherwise use the materials. A fundamental issue facing those undertaking electronic publishing, is how to control and prevent the unauthorized and unaccounted distribution or usage of electronically published products. Authors and publishers may want to control who is permitted to use electronic products, and to be able to change permissions over time even after the products are distributed. Authors and publishers may also want to sell the electronic products or receive royalties for each counted delivery of the products, therefore any unaccounted distribution of the products results in unpaid royalties.
Existing web repository systems where a plurality of users can share sets of electronic products such as DocuShare™ (a trademark of Xerox Corporation), permit end users to share electronic products and administer and control initial access with individual and group access permissions through password-protected accounts, non-location-based URLs, and permissions matrices that associate access permissions for specified accounts with specified electronic products. However, end users are not able to administer or control ongoing usage with individual and group usage permissions for encrypted files through the system. Here usage is distinguished from access, in that usage refers to actually using the product (e.g., viewing or printing), and access refers to accessing a copy of the product, which if encrypted is not usable without a key for decryption. Further, end users are not able to create markets (public or private) with usage and payment options associated with individual and group accounts for particular electronic products.
Existing systems for controlling the distribution and use of electronic products such as ContentGuard™ (a trademark of Xerox Corporation), allow publishers to encrypt electronic products and specify digital property rights. However, end users cannot administer or control usage of particular electronic materials for particular individuals or groups, and only central administrators can control who has access to a market. Also, digital property rights are attached to the digital products using rights labels, and such rights are intended to be permanent or at best narrowed rather than broadened. Furthermore, because the rights labels are attached to the digital products, there is no means of changing rights options for copies of digital products that are in the customers' hands, except to locate each one of them and change the options individually. Thus, once the copies of digital products are outside of the possession of the seller, digital rights cannot be changed even if the user purchases the license after the time of the desired change.
Further, existing systems which include management of usage permissions or digital rights are currently only accessible through electronic user interfaces. There is no ability to automatically correlate usage permissions or digital rights with paper documents.
Thus, known systems for the distribution of electronic products, do not provide for highly distributed configuration and administration of public and private electronic markets. They do not allow the marketmakers or sellers to control who may access and/or use the markets or products. These centralized systems further do not give sellers the ability to upload electronic products with usage permissions controls which may be altered by the marketmaker dependent upon a particular situation. Finally, these systems do not provide an interface between the electronic markets and paper documents.
In accordance with one aspect of the invention, set forth is a system and method for forming electronic markets which include electronic content, system provides access to a communication network having an electronic server system configured to permit communication among a community of users, where the server system is used to host the electronic markets. A distributed configuration and administration system permits any authorized user of the community of users to have the capability of configuring and administrating electronic markets. A set of access permissions control which users of the community of users have access to electronic markets, and a set of usage permissions control the use of content contained in the electronic markets. A set of management permissions control which users of the community of users can manage the access and usage permissions for markets and content.
The invention may take form in various components and arrangements of components, and in various steps and arrangements of steps. The drawings are only for purposes of illustrating preferred embodiments and are not to be construed as limiting the invention.
An embodiment of the present invention provides a method and system which permits distributed administration of public and private markets, where end users or marketmakers create the markets and control access and usage, including what product (i.e., electronic content, electronic document, or document file) is to be for sale, and payment options. These markets may be hosted on servers where marketmakers exercise control via access through a worldwide electronic communication network such as a private network, Internet and/or World Wide Web or other system.
Access to private markets is controlled through passwords and through properties of account profiles such as group memberships. For digital content, marketmakers upload the content to a server, and specify digital usage permissions that limit viewing, listing and printing of the content. Payment options are fully controllable by the marketmaker, including subscriptions, pay-per-use and pay-per-document. The embodiments described require little technical expertise from the marketmaker to create electronic markets with usage permissions for electronic content. Password protection controls access to the markets, and encryption enables control of usage. Thus, any user of a community of users in a network is given the capability to set up their own market. The design of this system makes it feasible to create as small or large a market as desired by the marketmaker.
The distributed administration system permits the creation or authoring of the markets to allow a mixture of individual user accounts or user groups have varying levels of privileges for each market or individual content in each market. The marketmaker is given control to create and administer the market to his or her own needs. For example, the market may be created so that users or groups of users, when logged on, will read their unique privilege rights to see items in the market.
The marketmaker also has the ability to add items to a market and administrative privileges to add or delete user accounts and/or groups, among other administrative decisions. As will be described in greater detail below, permissions are stored separate from the content. By storing the permissions separate from the content, the ability to alter the permissions per each electronic content is easily achieved. Stored with the content is the electronic content identifier and a server location (e.g., URL (Universal Resource Locator) of the server storing the corresponding permissions).
Electronic market server system 20 includes an access/usage permissions server/database 24 and a merchandise server/database 22. These databases may be located on the same or different servers of system 20, and in some embodiments may be described themselves as servers. As may be seen by
When a first user 10 wishes, for example, to make ContentA 29 available to others, user 10 may become a marketmaker, since each user is provided with the ability to this content with usage permissions.
Using such a system, any user of the community, for example the first user (marketmaker) 10, may form their own electronic market via the use of their web browser or other appropriate interface. Particularly, the marketmaker will upload the electronic content, and may encrypt the content and embed the electronic content identifier and server location with the content.
The marketmaker is provided with the capability of creating and administrating the market as a public market or a private market with selected access and/or usage options. More specifically, and as shown in
In this example, the user/group listing “Anyone” 61 gives all users of the community view 50, print 52, and write 56 permissions. This indicates the market is public. In this example, only the user account identified as “Tao Liang” is given manage 54 permissions. Manage permissions allow particular users/groups to change all elements of the permissions matrix 40, including the user/group list, the usage permissions 49, access permissions 54, and usage fees 58 for each user/group listing. Manage permissions also allow particular users/groups to change the location of the content by specifying in which markets the content will appear. Permission matrix files 40, are constructed for both the markets themselves and for individual content within the markets. Distinctions between usage permissions and access permissions will be described in greater detail in following sections of the description.
As previously noted, any user of the community of users within the network may create a market, which may be a single electronic piece of content or multiple distinct content.
Once the permissions are selected, the system, in one embodiment, encrypts and automatically stores the encrypted content 72 in place of the previously unencrypted content 64. The process shown in
In one scenario, concepts of the present embodiment may be used by firms which create significant amounts of electronic content in the form of service manuals, training videos, sales and marketing collaterals, and a variety of other materials. Many of these firms also sell these materials to distributors and other external agents who sell the firm's content. Companies are interested in not allowing their competitors to have access to these content, and spend significant effort to avoid this from occurring by controlling usage of documents through encryption and passwords with expiration dates.
The present embodiment permits such publishers to use a web browser and Internet connection, to easily create and maintain a private market for this content. Through the use of a browser, users from an organization, such as a community of users, can create the private market, create user accounts and user groups with password protection for access to the market, upload content and encrypt (if desired) for controlling usage of digital content, download digital content for a fee or for free, as well as place an order for physical content (e.g., paper manuals and other collaterals). The system is developed for distributed administration rather than centralized administration.
In another scenario, the present invention may be used by educational institutions who frequently develop unique content such as course curriculum, case studies, and videos of presentations, in addition to content from other sources such as journal articles and books. Such educational institutions often share this unique content for free, or with a fee, among trusted consortium members, which may include other educational institutions and/or firms. The manner of operation of the present system when in the educational environment does not differ greatly from when in the corporate environment. However, the users are different (e.g., teachers, students, industrial peers), and the context is different (e.g., classrooms and consortia). Also the reasons for controlling usage are different. For example, an expressed need at some educational institutions is to control usage beyond the classroom for materials scanned online from external sources that are being used in classes under the copyright fair-use guidelines.
In order to take advantage of the concepts of the present system, a user needs to be a part of the community of users. This can be either registered in the system or determined by external criteria. An example of such external criteria can be, but not limited to, examining the user's computer IP address. For example, all computers with fully qualified domain name ending in CompanyA.com can be considered part of the CompanyA community. As shown in
Any registered user may then decide that they wish to create a market and become a marketmaker. This capability emphasizes the distributed administrative nature of the system as opposed to the centralize requirements of existing systems. In the present embodiment, and as shown more particularly in
As previously discussed, although the step of creating the market 114 includes preselected access permissions, the marketmaker is given the ability to alter these permissions 116. The marketmaker has the control to provide access to all users of the community and therefore create a public type market, or to limit access to specific users and/or groups such that the market may be considered a private market.
Following the specifying of access permissions, which is to be placed in the market is uploaded to a system server 118. As part of the upload process, a unique electronic content identifier is created 120 for the content which is stored on the server 122. Any number of distinct contents may be uploaded and are made part of the market, and by default, this content will inherit the permissions of the market (i.e., collection). The marketmaker is also provided with the capability to implement content protection procedures by supplying usage permissions and fees associated with that specific file 124. For example, this is shown in connection with previously described
When it is determined usage permissions and/or fees are to be included, the marketmaker specifies the permissions and fees 128 as discussed in connection with
Once specific permissions and fees have been set, the system moves to encrypt the selected electronic content 130. Various encryption techniques may be used in conformance with the present concepts. In one particular embodiment, a verification key is generated 132 in order to ensure that the proper content is being supplied when it is decrypted. The generated verification fee is stored in a server 134. The content then has embedded, the unique electronic content identifier (of steps 120, 122) and the permissions server URL 136. The content is then encrypted using a random content key 138, which is stored in a system server 140. Again, since encryption processes which may be used herein are well known in the art, they will not therefore need to be described in greater detail.
As a next step in the process flow, the marketmaker is provided with an opportunity to specify additional users and/or usage groups 142, change permissions and fees for currently listed users and/or groups, or delete existing users and/or groups from the list. If additional individual users or groups are added, then the specific permissions and fees for the users or groups are specified 144. Steps 142 and 144 may be repeated until all modifications to usage permissions are addressed. Steps 142, 144 may be repeated independently of each other, and may be repeated at any subsequent time by any authorized user who has appropriate manage permissions
The steps of
Under the current embodiment, the uploading of the electronic content, such as step 118, uploads unprotected, i.e., non-encrypted content. The access permissions provide access to the digital bits of the electronic content. Therefore, users could, through their access permissions obtain these digital bits at their computer. However, if the content is also encrypted, then it is necessary to have the usage permissions in order to decrypt the files for viewing. If the file was unencrypted, the downloading of the bits would permit access to viewing the content. Therefore, this design permits the use of access permissions for some such as those that are unencrypted, or using access and usage permissions for content which are encrypted and need to be decrypted for viewing.
Once the market has been created, embodiments of the present invention then permit a buyer (i.e., another user of the community) having the appropriate permissions and/or licenses to access the digital content. The operation of the license/usage flow 200 according to an embodiment of the present invention is illustrated in
As a first step in the process flow of
Therefore, the steps 206-214 provide a two-level access permissions flow. A first access permission checks whether matrices previously stored in a server for a particular market will permit that user to enter the market. Once it is determined the user has access to the market, then within each market, a review is made as to the particular content which has been previously uploaded to the market, as described in connection with step 210. If the user is permitted to view content, an icon representing that content is displayed. Therefore, in a situation where the user has been allowed into a particular market (i.e., collection) and there are for example ten distinct pieces of content, it is possible that the user will only be permitted to view the content icons for a subset of the content (i.e., they may only see 5 out of the 10). This flow permits precise control over who may access a particular market as well as content within that market.
With continued attention to the flow of
This second check of access permissions 218 is also undertaken to ensure that permissions that were previously checked in step 210 are still valid. Particularly, the checking at step 218 is used as the step 210 may be accomplished when a user enters a market, but significant time may pass between the time when it is verified the user has access permission 210, until specific content is selected in step 216. Therefore, step 218 provides the benefit of a “double check.” One example of this delay situation is where a user logs on at the beginning of the day and does not make access to particular content until the end of the day. During this time period access permissions could potentially change. Also, in another embodiment the system may be designed to check different access permission at different steps 210 and 218. In some embodiments this “double check” process may not be implemented. This “second check” is also undertaken to enable the scenario where a user already has encrypted content, and only needs to check access permissions for the particular content rather than for all content in the associated market. This scenario is described in more detail in preceding paragraphs.
If the access permissions are not available, the process moves to step 220 and access is denied. Alternatively, if it is determined access permissions for that particular content does exist, the process moves to a next decision step where usage permissions for that content are checked 222. When the specific usage permissions do not exist, access is denied 224. On the other hand, when usage permissions exist for that particular user, the process moves to step 225 which displays usage permissions and fees. One embodiment of such display would be screen 80 of
Once this selection is made, the process moves to the generation of a license through a process of encrypting the content key with the user key, and attaching a verification key 232. The user will then download the content and the license 234. It is to be noted that the generated license in step 232 is downloaded to the computer of the user. More particularly, the license is user/machine specific.
Next the user selects the encrypted content through a selection mechanism such as a mouse or other input device. At this point the process moves to step 238 where the operating system invokes the broker or viewer. The broker takes the encrypted content and looks for the license, and verifies that the license is present on the user's computer. Particularly, the process moves to step 240 where the decision block checks if the license exits via the use of the broker. When a license does exist, the content key is generated by decrypting the license with the user key 242 and the content is decrypted through use of the content key 244. Once the content has been decrypted, a verification process is undertaken with the verification key to ensure that it is the proper content.
At this point, a rendering software is invoked 248 such as “GhostScript” (a viewer and/or player which interprets the PostScript language (GhostScript is a trademark of Ghostgum Software Pty. Ltd., and PostScript is a trademark of Adobe Corporation.)) to permit viewing and/or displaying of content. It is to be understood that reference to PostScript and GhostScript are referred to only as examples, and the concepts of the present application may be implemented in conjunction with use of other languages and/or viewers or players. This system will also disable the commands in the pull-down bars such as shown in
If at step 240, the broker is unable to determine that a license exists on the user's computer, the system then moves to step 254 where the system reads the encrypted file to determine the URL server and electronic content identifier of the encrypted content. Using this information, the system logs in to the server 256, and the process of
It is also noted that when the deny access step 220 occurs, the process loops back to step 204 permitting the user again to attempt to enter or access a market on the system.
Lastly, steps 210 and 214 show a capability of checking multiple accesses for the content in the market and displaying the icons in accordance with the existence or nonexistence of appropriate access permissions.
The main thrust of
The foregoing describes, therefore, a system where a server identifier (e.g., URL) and a content identifier (e.g., a content number of the content on the identified server) are encoded with the encrypted content, while the permissions for particular content of a particular individual or group account is stored in the server. This process works to associate a set of usage permissions without attaching them to the electronic content.
This system also differentiates itself from existing systems by having access to the decryption keys controlled through at least one authenticated account (e.g., password protected login account) on the identified permissions server. This is opposed to existing systems which associate passwords to files and which simply verify the password locally without contacting a permissions server.
An issue of existing systems for managing usage permissions is that they are only accessible through electronic user interfaces, yet paper has the potential to be a more convenient interface in certain instances. Also, previous systems do not provide the ability to automatically correlate usage permissions with paper documents.
In a further embodiment of the present invention, as illustrated in
Rather than scanning the paper document into an electronic format and later specifying usage permissions and/or fees using an electronic interface, these separate processes are combined into a single process by using a machine readable cover sheet encoded with enhanced bar codes. Thus, in
Such paper interfaces can be used to also initiate a transaction with an electronic market having usage permissions. For example, a buyer 422 uses a paper interface 424 having a unique identification encoded on paper using enhanced barcodes. This may be submitted to the electronic system via the network system 410 or a fax machine 426 which in turn provides the interface material to the enhanced barcode server 412. The enhanced barcode server would read the now-digitized information thereby allowing the user to implement a paper document to initiate a purchase, record usage of property or initiate some other usage permissions transaction. The present system has an advantage over existing systems and will afford a portability not presently in existence. The technology also significantly reduces the barrier for people to obtain and pay for legal copies of copyrighted materials.
Once the user's request via paper interface 424 has been received, appropriate operation of the system, as previously described, will take place and the user's requested content, for example document 404, may be delivered via the fax machine 426 or network printer/scanner 428.
Thus, described is a system and method for using paper as an interface to electronic markets with usage permissions, for both specification of usage permissions and for managing usage of content including payment once usage permissions are established. This is accomplished by using machine readable enhanced barcodes (e.g., Xerox data glyphs) on paper forms, and a system that interprets the forms. This process streamlines the workflow for specifying usage permissions, correlating usage permissions with individuals and/or groups, and specifying payment options. This also enables new functionality for managing usage with usage permissions by consumers. For example, it may be used to initiate payment, specify distribution mechanisms, point of delivery, and record usage all through the use of a paper interface. For digital documents, users can initiate immediate fulfillment.
Once a product (e.g., electronic document file) is stored within an electronic market, a paper interface can be used to modify previously set permissions. For example, in the foregoing discussion, once a paper document is scanned and stored in the market as content, a paper token is returned which uniquely identifies the content stored in the electronic market using enhanced barcodes. When the marketmaker wants to modify the usage permissions (for example increase the price), the marketmaker takes the paper token, selects appropriate boxes on the form to change the usage permissions (e.g., view permission and associated price), and then scans just the token into the system. An example of a token (used for other purposes) is also described in connection with
In an alternative, the token may already include a unique identifier for a user (buyer) or user group (group of buyers), and for enhanced security, a personal identification sticker 462 may be placed on the form which can only be used once. One-use stickers are accomplished by having a unique number on each sticker, which is registered as used by an appropriate permissions server. This security can, in another embodiment, be further enhanced to require a password for use with the enhanced barcode form. In addition, tokens with enhanced barcodes may include lists of content in a market, which can be checked to obtain tokens or multiple pieces of content. Also, tokens with enhanced bar codes may include lists of markets, which can be checked to obtain content in those markets.
Thus, in accordance with concept of the present invention, in situations where there are large amounts of documents on paper, such as in a library, a library staff could use a cover sheet for each document scanned, select the appropriate digital rights, and the system would automatically interpret the scanned form and interface with the digital rights server. Therefore, rather than having multiple steps in their workflow, the system reduces this to one step by automatically interfacing with the rights server.
Another benefit is shown in a scenario where a central library obtains numerous requests for hard copies of documents. Even when the original hard-copy document is supplied to the requester, and paid for, commonly the requester then makes multiple copies or provides the opportunity for co-workers to make multiple copies without providing further compensation to the copyright holder. With the present system, an interface cover page (token) may be included with the hard copy of the article provided by the library. When a copy is to be made for a peer, or co-worker, the interface cover page can be faxed and/or scanned and the encoded rights information can be communicated through the internet to a central permissions server or a local permissions server in order to maintain some control within the organization. The interface cover page may have options for only initiating a charge (local copy of article is made by employee) or can include a unique content identifier listed in the permissions server database, and a unique identification for the corporate library for other paying entity. The server responds by checking the requested transaction against the permissions recorded for the paying entity in the permissions server. These permissions can be structured in a variety of ways, including pay-per-document and prepaid for a number of documents. With the pay-per-document, the server will initiate a new charge to the paying entity. With the prepaid, the server will increment the number of documents requested, check this among the number of the prepaid limit, then a response will be returned to the buyer noting that the limit has been reached and including contact information for the paying entity.
The described system therefore includes options to have the security features for accessing markets, utilizing technology such as one-use personalized enhanced-barcode stickers, password protection through scanning stations, or physical devices such as hardware key/dongle.
The invention has been described with reference to the preferred embodiments. Obviously, modifications and alterations will occur to others upon reading and understanding the preceding detailed description. It is intended that the invention be construed as including all such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5444779||Jul 29, 1994||Aug 22, 1995||Xerox Corporation||Electronic copyright royalty accounting system using glyphs|
|US5530235||Feb 16, 1995||Jun 25, 1996||Xerox Corporation||Interactive contents revealing storage device|
|US5530520||Dec 15, 1994||Jun 25, 1996||Xerox Corporation||Method of allocating copyright revenues arising from reprographic device use|
|US5629980||Nov 23, 1994||May 13, 1997||Xerox Corporation||System for controlling the distribution and use of digital works|
|US5634012||Nov 23, 1994||May 27, 1997||Xerox Corporation||System for controlling the distribution and use of digital works having a fee reporting mechanism|
|US5638443||Nov 23, 1994||Jun 10, 1997||Xerox Corporation||System for controlling the distribution and use of composite digital works|
|US5682540||Dec 8, 1994||Oct 28, 1997||Xerox Corporation||System for representing electronic files using a paper based medium|
|US5715403||Nov 23, 1994||Feb 3, 1998||Xerox Corporation||System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar|
|US5930801||Oct 30, 1997||Jul 27, 1999||Xerox Corporation||Shared-data environment in which each file has independent security properties|
|US5960441||Sep 24, 1996||Sep 28, 1999||Honeywell Inc.||Systems and methods for providing dynamic data referencing in a generic data exchange environment|
|US5968177 *||Oct 14, 1997||Oct 19, 1999||Entrust Technologies Limited||Method and apparatus for processing administration of a secured community|
|US6185684||Aug 28, 1998||Feb 6, 2001||Adobe Systems, Inc.||Secured document access control using recipient lists|
|US6205549||Aug 28, 1998||Mar 20, 2001||Adobe Systems, Inc.||Encapsulation of public key cryptography standard number 7 into a secured document|
|US6389538 *||Oct 22, 1998||May 14, 2002||International Business Machines Corporation||System for tracking end-user electronic content usage|
|US6631495 *||Jun 11, 1998||Oct 7, 2003||Fuji Xerox Co., Ltd.||Electronic document identification, filing, and retrieval system|
|US6948070 *||Oct 30, 2000||Sep 20, 2005||Intertrust Technologies Corporation||Systems and methods for secure transaction management and electronic rights protection|
|US20020016727 *||Jun 18, 2001||Feb 7, 2002||Thoughtbank, Inc.||Systems and methods for interactive innovation marketplace|
|US20030014317 *||Jul 12, 2001||Jan 16, 2003||Siegel Stanley M.||Client-side E-commerce and inventory management system, and method|
|WO2001016826A1 *||Jul 12, 2000||Mar 8, 2001||Ranel E Erickson||Electronic commerce communication systems with multiple user-define marketplaces, controlled pricing, and automated purchasing capabilities|
|1||"Chris MacAskill CEO, Mighty Words", interviewed by David Needle, Aug. 7, 2000; Tech Week Talking Points; article found Jan. 8, 2002 at http://www.techweek.com/articles/8-07-00/talk.htm.|
|2||"IBM to Unveil Digital Music Copy Protections" by Dawn C. Chmielewski; Mercury News, Jan. 21, 2001; article found Jan. 8, 2002 at wysiwyg://48/http://www.iarchive.c...s/jan-01/IBMunveildigitalmusic.htm.|
|3||"Seybold: Fatbrain takes Publishing to the Masses" by James Niccolai; IDG News Service, Aug. 31, 1999; Network World Fusion News; article found Jan. 8, 2002 at http://www.nwfusion.com/news/1999/0831fatbrain.html.|
|4||"Will Fatbrain.com's New Model Work?" by Chet Dembeck; E-Commerce Times, Sep. 10, 1999; article found Jan. 8, 2002 at http://www.ecommercetimes.com/perl/story/1205.html.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7466823||Mar 5, 2001||Dec 16, 2008||Steve Vestergaard||Digital media distribution method and system|
|US7529712||May 8, 2003||May 5, 2009||Yangaroo Inc.||Content distribution system and method|
|US7568237 *||May 26, 2005||Jul 28, 2009||Health Allianze||Access control list with convolution-weakened authorization|
|US7703002||Mar 31, 2003||Apr 20, 2010||Ricoh Company, Ltd.||Method and apparatus for composing multimedia documents|
|US7721945 *||Jun 29, 2006||May 25, 2010||Motorola, Inc.||Method and system of pre-loading preferred access contact information in memory|
|US8271529 *||Aug 9, 2010||Sep 18, 2012||Yuheng Qiu||Location-based and time control-based interactive information group and distribution platform|
|US8577966 *||Mar 13, 2013||Nov 5, 2013||Smartebook.Com Co., Ltd.||Content sharing system and content sharing method|
|US8621641||Feb 29, 2008||Dec 31, 2013||Vicki L. James||Systems and methods for authorization of information access|
|US9083700||Nov 26, 2013||Jul 14, 2015||Vicki L. James||Systems and methods for authorization of information access|
|US20020146122 *||Mar 5, 2001||Oct 10, 2002||Steve Vestergaard||Digital media distribution method and system|
|US20040243459 *||Jan 26, 2004||Dec 2, 2004||Geritz William F.||System and method for automating business development|
|US20040259355 *||Jun 17, 2003||Dec 23, 2004||Zhiping Yin||Boron-doped amorphous carbon film for use as a hard etch mask during the formation of a semiconductor device|
|US20050246221 *||Feb 14, 2005||Nov 3, 2005||Geritz William F Iii||Automated system and method for determination and reporting of business development opportunities|
|US20060272033 *||May 26, 2005||Nov 30, 2006||Paris Steven M||Access control list with convolution-weakened authorization|
|US20070255614 *||Mar 8, 2007||Nov 1, 2007||Ourednik Patricia A||Method and system for developing an audience of buyers and selecting leads based on their behavioral preferences|
|US20080000958 *||Jun 29, 2006||Jan 3, 2008||Motorola, Inc.||Method and system of pre-loading preferred access contact information in memory|
|US20080270151 *||Apr 26, 2007||Oct 30, 2008||Bd Metrics||Method and system for developing an audience of buyers and obtaining their behavioral preferences to promote commerce on a communication network|
|US20110035384 *||Feb 10, 2011||Yuheng Qiu||Location-Based and Time Control-Based Interactive Information Group and Distribution Platform|
|US20110106685 *||Jun 30, 2010||May 5, 2011||Secondmarket, Inc.||Issuer-controlled market platform and system for restricted holdings and transaction management|
|US20140040122 *||Oct 4, 2013||Feb 6, 2014||Smartebook.Com Co., Ltd.||Content Sharing System and Content Sharing Method|
|International Classification||G06Q30/06, G06F12/14, G09C5/00, G06F21/24, G06F7/04, G09C1/00|
|Jan 9, 2002||AS||Assignment|
Owner name: XEROX CORPORATION, CONNECTICUT
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BELL, DAVID G.;LIANG, ANTHONY TAO;GARNAAT, MITCH;AND OTHERS;REEL/FRAME:012485/0456;SIGNING DATES FROM 20011211 TO 20011219
|Jul 30, 2002||AS||Assignment|
Owner name: BANK ONE, NA, AS ADMINISTRATIVE AGENT,ILLINOIS
Free format text: SECURITY AGREEMENT;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:013111/0001
Effective date: 20020621
|Oct 31, 2003||AS||Assignment|
Owner name: JPMORGAN CHASE BANK, AS COLLATERAL AGENT,TEXAS
Free format text: SECURITY AGREEMENT;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:015134/0476
Effective date: 20030625
|Apr 20, 2011||FPAY||Fee payment|
Year of fee payment: 4
|Dec 31, 2013||AS||Assignment|
Owner name: XEROX CORPORATION, NEW YORK
Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK ONE, NA;REEL/FRAME:031861/0936
Effective date: 20030625
|Jan 3, 2014||AS||Assignment|
Owner name: XEROX CORPORATION, NEW YORK
Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:031888/0233
Effective date: 20061204
|Jul 17, 2015||REMI||Maintenance fee reminder mailed|